The School of Electrical Engineering and Computer Science (EECS) CS/ECE Applied Cryptography Dr. Attila Altay Yavuz Big Picture and Organization Applied.

Slides:



Advertisements
Similar presentations
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Course Introduction.
Advertisements

Slide 01-1COMP 7370, Auburn University COMP 7370 Advanced Computer and Network Security Dr. Xiao Qin Auburn University
OEMBA Information Systems Course James R. Coakley PhD, Accounting Information Systems Minor in Statistics and Computer Science MBA BS, Math/Computer Science.
1 Computer Engineering Department College of Computer Sciences and Engineering Tuesday 18 November 2008 King Fahd University of Petroleum & Minerals.
1 i206: Distributed Computing Applications & Infrastructure 2012
CIT110 – Introduction to Information Technology Dr. Catherine Dwyer Fall 2011.
Successful Graduation Projects
FIT3105 Smart card based authentication and identity management Lecture 4.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CIS700: Hardware Support for Security Professor Milo Martin
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
BLENDED LEARNING Technology in the Traditional Classroom Alyssa DeBlasio, PhD (Dickinson College, USA)
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Introduction to Network Security Dr. Attila Altay Yavuz Big Picture and Organization.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Google Apps for Education WCPS Summer Institute 2011.
Need for Privacy Enhancing Technologies 1 What is challenging about standard encryption?
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic Institute of NYU.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
1 Securing Wireless Sensor Networks Wenliang (Kevin) Du Department of Electrical Engineering and Computer Science Syracuse University Excerpted from
EE Faculty. EE Technical Areas Micro Devices & Physical Principals Integrated Circuits & Systems Signals & Information Processing Networking & Communications.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Big Picture and Organization Advanced.
8/30/2010CS 686 Definition of Security/Privacy EJ Jung CS 686 Special Topics in CS Privacy and Security.
Class will start at the top of the hour! Please turn the volume up on your computer speakers to access the audio feature of this seminar. WELCOME TO CE101.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Integrating HaSAFSS into R.E.D for Node Replication Detection in Wireless Sensor Networks Shajith Ravi School of EECS - OSU CS519 - Advanced Network Security.
Amit Warke Jerry Philip Lateef Yusuf Supraja Narasimhan Back2Cloud: Remote Backup Service.
Most of contents are provided by the website Introduction TJTSD66: Advanced Topics in Social Media Dr.
Proposal for Term Project Information Security, Fall 2014 J. H. Wang Sep. 25, 2014.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Introduction to Information Security J. H. Wang Sep. 18, 2012.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
What does it mean to be a RETA Instructor this project? Consortium for 21 st Century Learning C21CL
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Topic 1.0 Big Picture, Vision.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Introduction to Network Security Dr. Attila Altay Yavuz Big Picture and Organization.
Koji OKAMURA Cybersecurity Center, Kyushu University Cybersecurity Education.
Who am I? Mikhail I. Gofman Assistant Professor of Computer Science at CSUF since Fall Education: Ph.D. in Computer Science at State University of.
EDGE™ Final Project Plan Presentation P09001 – RFID Reader & Active Tag Philip Davenport (Industrial and Systems Engineering)
Big Data Analytics Are we at risk? Dr. Csilla Farkas Director Center for Information Assurance Engineering (CIAE) Department of Computer Science and Engineering.
Internet of Things. Creating Our Future Together.
Security of the Internet of Things: perspectives and challenges
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
Proposal for Term Project Information Security, Fall 2013 J. H. Wang Nov. 5, 2013.
Computer Science and Engineering 1 Cyber Security University of South Carolina Columbia Center for Information Assurance Engineering (CIAE)
Big Picture and Organization
Proposal for Term Project Information Security, Fall 2016
CS/ECE 578 Cyber-Security Dr. Attila Altay Yavuz
Program Analysis and Software Security
CS/ECE Applied Cryptography Dr. Attila Altay Yavuz
Data and Applications Security Developments and Directions
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Internet of Things (IoT)
Cryptography and Computer Security for Undergraduates
BROADCAST AUTHENTICATION
Course Overview and Organization
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Presentation transcript:

The School of Electrical Engineering and Computer Science (EECS) CS/ECE Applied Cryptography Dr. Attila Altay Yavuz Big Picture and Organization Applied Cryptography Dr. Attila Altay Yavuz1Winter 2016

OSU EECS Dr. Attila Altay Yavuz 2 Outline (current lecture) Self-introduction Course Objectives ( overview) –Touching important problems and tools (name & functionality) –Grading –Requirements Example Project Topics –Decision on your topic, assess your background/commitment

OSU EECS Dr. Attila Altay Yavuz 3 Self-Intro Assistant Professor, EECS at Oregon State University Adjunct Faculty, University of Pittsburgh (Jan now) Research Scientist, Bosch Research Center (Dec Aug. 2014) –Develop security and privacy research programs –Privacy-preserving Big Data Technologies (~1M) –Secure Internet-of Things and Systems (~250K) Ph.D., North Carolina State University (Jan Aug. 2011) –Compromise Resilient and Compact Crypto for Digital Forensics MS, Bogazici University ( ) –Efficient Crypto Mechanisms for Military Ad-hoc Networks

OSU EECS Dr. Attila Altay Yavuz 4 Self-Intro (Cont’) Research Interests: Applied cryptography, network security, privacy Academic Collaborations: Upitt, UNC, UCI, Purdue-CIT, CMU Industry Collaborations: Bosch, Oracle, Cisco, SEI-CMU, ISE Some Impact Examples: ECU Privacy-Preserving Medical Databases (HCTM, 2016) Secure Intra-car Networks (OEMs, 2018)

OSU EECS Medium term Long term Near term Big Picture: Technology Trends & Vision Smart-infrastructures and distributed systems Big Data Technologies Cloud-based Applications Smart Home Inter vehicular networks Smart-grid Smart-city Digitalized Healthcare Inf. Sys. 5

Challenges of Security and Privacy in IoTS Requirements and Challenges Cloud-based Services Smart-home and WSNs Heterogeneity Vehicular networks (e.g., Car-2-X) High Performance/Scalability Data Availability Interconnectivity 6 SOMETHING MISSING?

Need for Privacy Enhancing Technologies 7 Privacy Breaches: Big Data and IoTS

OSU EECS Cyber Physical Systems - Vulnerabilities Reliable Cyber-Physical Systems (e.g., smart-grid) are vital – Susceptible: Northeast blackout (2003), 50 million people, $10 billion cost – Attacks: False data injection [Yao CCS09’], over 200 cyber-attacks in 2013 Vulnerability: Commands and measurements are not authenticated Requirements for a security method – Real-time  Extremely fast processing (a few ms) – Limited bandwidth  Compact – Several components  Scalability Limitations of Existing Methods – PKC is not yet feasible (computation, storage, tag size) – Symmetric crypto is not scalable (key management ) 8

OSU EECS Security Challenges for Smart-Infrastructures (II) 9 Internet ECU Vulnerability: Commands and measurements are not authenticated Security for Inter-car Networks – Manipulate direction/velocity, crashes Security for Intra-car Networks – Large attack surface [Usenix '11] – ECUs of break/acceleration, airbag Challenges – Strict safety requirements – Limited bandwidth, real-time processing The state-of-art cannot address (as discussed) Inter-car and Intra-car Networks

OSU EECS Pillars and Target Topics Please check course website for material and Syllabus! Pillar I-II: Authentication and Integrity – Broadcast Authentication: Internet, wireless net., multi-media, … Vehicular networks, power-grid, smart-grid, drones… – Specialized Signatures: Real-time, compromise-resilient, hybrid, … Pillar III: Privacy (Confidentiality) and Functionality – Privacy Enhancing Technologies – Cloud computing and data outsourcing: SE, ORAM, Garbled Circuits, OT Pillar IV: Availability and Resiliency (time permits) – Denial of Service (Client-server application) – 10

OSU EECS Background Requirements A previously taken cryptography/network security class is a must –CS 419 Introduction to Network Security –CS 519 Special Topics on Crypto/NetSec –CS 419 Cryptography (Mike Rosulek) –CS/ECE 419 Computer Security (Rakesh Bobba) –No such course  Please drop this course A good programming skill is a necessary –Very good C/C++ experience, Linux –Java/C# may be ok (but C/C++ rules the crypto world, for good reasons!) Experience on mobile devices is required for some projects How to achieve more in less than two months? –Form sub-teams and integrate them into my research group –Enforce background requirement –Volunteers to continue after the course

OSU EECS High-Level Objectives (PETS Track) Dynamic Symmetric Searchable Encryption (DSSE) (1 lecture) Privacy in Cognitive Radios (1 lecture) –LPOS scheme, DB-based approaches, Anti-jamming Hybrid Cryptography via Signcryption –Signcrypt >> Sign + encrypt Oblivious Random Access Memory (2 lecture) –Basic ORAM, Partition ORAM, Path ORAM –Novel ORAM constructions with highly efficient constants Oblivious Dynamic Searchable Encryption (1 lecture) –A multi-server approach

OSU EECS High-Level Objectives (Authentication Track) Structure-Free Compact Authentication & HW acceleration –Vehicular networks, theory to practice Broadcast Authentication (2 lectures) –TESLA: Playing with time factor  efficient authentication –EMSS: Address non-repudiation and sync. issues Counter DoS: Client-Server Puzzles (2 lectures, optional) –Hash-based –DLP-based Student Presentations

OSU EECS Student Presentations Depends on the size of the class Students with no prior presentation opportunity will be prioritized. Two high-quality paper to be presented. One base paper and one the most recent progress paper  See course website about requirements Topics to be selected: –Garbled Circuits –Oblivious Transfer –Privacy-preserving data mining I and II (two students 4 papers) –NTRU cryptosystem –Cost benefit analysis of PETs –Mobile system security –OS security

OSU EECS Depends on class-size, most qualified selected, first come first served Searchable Encryption (3 student), Thang: –GPU implementation (GPU experience) –Mobile-device implementation (Android or Apple), prior experience –Open-source porting, Dropbox and Amazon integration (network programming) Oblivious Random Access Memory (2), Gabriel: –Reasonable math and C/C++ background A Survey and cost analysis for PETs (2), Gungor: SPHINCS, Merkle-tree based signatures and traditional signature suite (3) (me) –Good implementation skills and crypto background PhD students are encourage to continue their own research. Send your previous courses and skillsets to project leads or me 15 Potential Projects and Presentations

OSU EECS PhD students can purse their own research as a part of the course –Please coordinate with your advisor. Prior projects (from Fall 2015) continues so no change is needed Class project is different then co-authoring, which requires: –Contribution well-beyond class –Continuous involvement, completing all aspects, active writing efforts –Potentially 4-6 months more work after the class! But well-worth if you commit 16 Potential Projects and Presentations

OSU EECS In-class paper presentation, %35 (subject to change) –See potential topics at the webpage –Full lecture style (or a single paper style) + question preparation Research Project or survey/implementation, %55 (subject to change) –Discussions with the team leader –Bi-weekly short reports to me (all together) –Discussion and agenda for deliverables and grading accordingly Class attendance/participation %10 Please let me know if you will continue this course by this week You are expected to conduct your research independently.You are expected to conduct your research independently. 17 Grading